/external/ipsec-tools/src/racoon/ |
isakmp_ident.c | 107 ident_i1send(iph1, msg) 108 struct ph1handle *iph1; 133 if (iph1->status != PHASE1ST_START) { 135 "status mismatched %d.\n", iph1->status); 140 memset(&iph1->index, 0, sizeof(iph1->index)); 141 isakmp_newcookie((caddr_t)&iph1->index, iph1->remote, iph1->local); 144 iph1->sa = ipsecdoi_setph1proposal(iph1->rmconf->proposal) [all...] |
isakmp_agg.c | 111 agg_i1send(iph1, msg) 112 struct ph1handle *iph1; 145 if (iph1->status != PHASE1ST_START) { 147 "status mismatched %d.\n", iph1->status); 152 memset(&iph1->index, 0, sizeof(iph1->index)); 153 isakmp_newcookie((caddr_t)&iph1->index, iph1->remote, iph1->local); 156 if (ipsecdoi_setid1(iph1) < 0 [all...] |
isakmp_base.c | 103 base_i1send(iph1, msg) 104 struct ph1handle *iph1; 131 if (iph1->status != PHASE1ST_START) { 133 "status mismatched %d.\n", iph1->status); 138 memset(&iph1->index, 0, sizeof(iph1->index)); 139 isakmp_newcookie((caddr_t)&iph1->index, iph1->remote, iph1->local); 142 if (ipsecdoi_setid1(iph1) < 0 [all...] |
isakmp_inf.c | 124 isakmp_info_recv(iph1, msg0) 125 struct ph1handle *iph1; 150 if (iph1->ivm == NULL) { 151 plog(LLV_ERROR, LOCATION, NULL, "iph1->ivm == NULL\n"); 156 ivm = oakley_newiv2(iph1, ((struct isakmp *)msg0->v)->msgid); 160 msg = oakley_do_decrypt(iph1, msg0, ivm->iv, ivm->ive); 188 if (iph1->status != PHASE1ST_ESTABLISHED) { 230 hash = oakley_compute_hash1(iph1, isakmp->msgid, payload); 263 switch (iph1->etype) { 267 if ((iph1->side == INITIATOR && iph1->status < PHASE1ST_MSG3SENT 624 struct ph1handle *iph1; local 698 struct ph1handle *iph1 = NULL; local 839 struct ph1handle *iph1 = iph2->ph1; local 1104 struct ph1handle *iph1; local 1615 struct ph1handle *iph1 = arg; local [all...] |
isakmp_newg.c | 69 isakmp_newgroup_r(iph1, msg) 70 struct ph1handle *iph1; 102 isakmp_info_send_n1(iph1, ISAKMP_NTYPE_INVALID_PAYLOAD_TYPE, NULL); 103 plog(LLV_ERROR, LOCATION, iph1->remote, 113 isakmp_info_send_n1(iph1, ISAKMP_NTYPE_INVALID_PAYLOAD_TYPE, NULL); 114 plog(LLV_ERROR, LOCATION, iph1->remote, 123 handle_vendorid(iph1, pa->ptr); 126 isakmp_info_send_n1(iph1, ISAKMP_NTYPE_INVALID_PAYLOAD_TYPE, NULL); 127 plog(LLV_ERROR, LOCATION, iph1->remote, 138 isakmp_info_send_n1(iph1, ISAKMP_NTYPE_INVALID_PAYLOAD_TYPE, NULL) [all...] |
handler.c | 221 struct ph1handle *iph1; local 227 LIST_FOREACH(iph1, &ph1tree, chain) 238 LIST_FOREACH(iph1, &ph1tree, chain) { 239 memcpy(&pd->index, &iph1->index, sizeof(iph1->index)); 240 pd->status = iph1->status; 241 pd->side = iph1->side; 242 memcpy(&pd->remote, iph1->remote, sysdep_sa_len(iph1->remote)); 243 memcpy(&pd->local, iph1->local, sysdep_sa_len(iph1->local)) 260 struct ph1handle *iph1; local 1081 struct ph1handle *iph1; local [all...] |
nattraversal.h | 45 #define NATT_AVAILABLE(ph1) ((iph1)->natt_flags & NAT_ANNOUNCED) 50 #define NON_ESP_MARKER_USE(iph1) ((iph1)->natt_flags & NAT_ADD_NON_ESP_MARKER) 78 vchar_t *natt_hash_addr (struct ph1handle *iph1, struct sockaddr *addr); 79 int natt_compare_addr_hash (struct ph1handle *iph1, vchar_t *natd_received, int natd_seq); 82 void natt_float_ports (struct ph1handle *iph1); 83 void natt_handle_vendorid (struct ph1handle *iph1, int vid_numeric); 93 int natt_keepalive_add_ph1 (struct ph1handle *iph1);
|
oakley.c | 131 static int oakley_check_certid __P((struct ph1handle *iph1)); 375 oakley_prf(key, buf, iph1) 377 struct ph1handle *iph1; 382 if (iph1->approval == NULL) { 389 type = iph1->approval->hashtype; 405 oakley_hash(buf, iph1) 407 struct ph1handle *iph1; 412 if (iph1->approval == NULL) { 419 type = iph1->approval->hashtype; 683 oakley_compute_hashx(struct ph1handle *iph1, ... [all...] |
isakmp_cfg.c | 139 isakmp_cfg_r(iph1, msg) 140 struct ph1handle *iph1; 170 if (iph1->mode_cfg->ivm == NULL || 171 iph1->mode_cfg->last_msgid != packet->msgid ) 172 iph1->mode_cfg->ivm = 173 isakmp_cfg_newiv(iph1, packet->msgid); 174 ivm = iph1->mode_cfg->ivm; 176 dmsg = oakley_do_decrypt(iph1, msg, ivm->iv, ivm->ive); 228 if ((check = oakley_compute_hash1(iph1, 251 isakmp_cfg_attr_r(iph1, packet->msgid, attrpl) [all...] |
gssapi.c | 154 gssapi_get_default_name(struct ph1handle *iph1, int remote, gss_name_t *service) 162 sa = remote ? iph1->remote : iph1->local; 187 gssapi_init(struct ph1handle *iph1) 203 gssapi_set_state(iph1, gps); 205 if (iph1->rmconf->proposal->gssid != NULL) { 206 id_token.length = iph1->rmconf->proposal->gssid->l; 207 id_token.value = iph1->rmconf->proposal->gssid->v; 212 gssapi_free_state(iph1); 216 gssapi_get_default_name(iph1, 0, &princ) [all...] |
isakmp.c | 404 struct ph1handle *iph1; local 459 iph1 = getph1byindex(index); 460 if (iph1 != NULL) { 463 iph1->side == INITIATOR) { 472 if (NATT_AVAILABLE(iph1) && 473 ! (iph1->natt_flags & NAT_PORTS_CHANGED) && 474 ((cmpsaddrstrict(iph1->remote, remote) != 0) || 475 (cmpsaddrstrict(iph1->local, local) != 0))) 478 racoon_free(iph1->remote); 479 racoon_free(iph1->local) 1026 struct ph1handle *iph1; local 1124 struct ph1handle *iph1; local 1869 struct ph1handle *iph1; local 2151 struct ph1handle *iph1 = NULL; local 2285 struct ph1handle *iph1; local [all...] |
nattraversal.c | 122 natt_hash_addr (struct ph1handle *iph1, struct sockaddr *addr) 131 saddr2str(addr), iph1->approval->hashtype, 132 (iph1->rmconf->nat_traversal == NATT_FORCE)?"(NAT-T forced)":""); 158 memcpy (ptr, iph1->index.i_ck, sizeof (cookie_t)); 162 memcpy (ptr, iph1->index.r_ck, sizeof (cookie_t)); 166 if (iph1->rmconf->nat_traversal == NATT_FORCE) 175 natd = oakley_hash (buf, iph1); 182 natt_compare_addr_hash (struct ph1handle *iph1, vchar_t *natd_received, 189 if (iph1->rmconf->nat_traversal == NATT_FORCE) 193 natd_computed = natt_hash_addr (iph1, iph1->local) [all...] |
oakley.h | 228 #define AUTHMETHOD(iph1) \ 229 (((iph1)->rmconf->xauth && \ 230 (iph1)->approval->authmethod == OAKLEY_ATTR_AUTH_METHOD_XAUTH_PSKEY_I) ? \ 231 FICTIVE_AUTH_METHOD_XAUTH_PSKEY_I : (iph1)->approval->authmethod) 232 #define RMAUTHMETHOD(iph1) \ 233 (((iph1)->rmconf->xauth && \ 234 (iph1)->rmconf->proposal->authmethod == \ 237 (iph1)->rmconf->proposal->authmethod) 239 #define AUTHMETHOD(iph1) (iph1)->approval->authmetho [all...] |
isakmp_xauth.c | 120 xauth_sendreq(iph1) 121 struct ph1handle *iph1; 128 struct xauth_state *xst = &iph1->mode_cfg->xauth; 132 if (iph1->status != PHASE1ST_ESTABLISHED) { 175 isakmp_cfg_send(iph1, buffer, 186 xauth_attr_reply(iph1, attr, id) 187 struct ph1handle *iph1; 194 struct xauth_state *xst = &iph1->mode_cfg->xauth; 196 if ((iph1->mode_cfg->flags & ISAKMP_CFG_VENDORID_XAUTH) == 0) { 265 strncpy(iph1->mode_cfg->login, usr, LOGINLEN) 361 struct ph1handle *iph1; local [all...] |
isakmp_unity.c | 86 isakmp_unity_req(iph1, attr) 87 struct ph1handle *iph1; 93 if ((iph1->mode_cfg->flags & ISAKMP_CFG_VENDORID_UNITY) == 0) { 144 reply_attr = isakmp_cfg_string(iph1, attr, buf); 150 reply_attr = isakmp_cfg_short(iph1, attr, 155 reply_attr = isakmp_cfg_short(iph1, attr, 160 reply_attr = isakmp_cfg_copy(iph1, attr); 164 reply_attr = isakmp_cfg_string(iph1, 170 reply_attr = isakmp_cfg_split(iph1, attr, 178 reply_attr = isakmp_cfg_split(iph1, attr [all...] |
isakmp_frag.c | 82 isakmp_sendfrags(iph1, buf) 83 struct ph1handle *iph1; 134 set_isakmp_header1(frag, iph1, ISAKMP_NPTYPE_FRAG); 151 if (isakmp_send(iph1, frag) < 0) { 177 isakmp_frag_extract(iph1, msg) 178 struct ph1handle *iph1; 231 if (iph1->frag_chain == NULL) { 232 iph1->frag_chain = item; 236 current = iph1->frag_chain; 248 item = iph1->frag_chain [all...] |
rsalist.c | 128 struct ph1handle *iph1; member in struct:lookup_result 140 local_score = naddr_score(key->src, req->iph1->local); 141 remote_score = naddr_score(key->dst, req->iph1->remote); 163 rsa_lookup_keys(struct ph1handle *iph1, int my) 169 saddr2str_fromto("%s <-> %s", iph1->local, iph1->remote)); 171 r.iph1 = iph1; 176 list = iph1->rmconf->rsa_private; 178 list = iph1->rmconf->rsa_public [all...] |
rsalist.h | 58 struct genlist *rsa_lookup_keys(struct ph1handle *iph1, int my);
|
vendorid.c | 251 handle_vendorid(struct ph1handle *iph1, struct isakmp_gen *gen) 261 natt_handle_vendorid(iph1, vid_numeric); 266 iph1->mode_cfg->flags |= ISAKMP_CFG_VENDORID_XAUTH; 269 iph1->mode_cfg->flags |= ISAKMP_CFG_VENDORID_UNITY; 277 (iph1->rmconf == NULL || iph1->rmconf->dpd)) { 278 iph1->dpd_support = 1;
|
admin.c | 275 struct ph1handle *iph1; local 292 if ((iph1 = getph1byaddrwop(src, dst)) == NULL) { 296 if (iph1->status == PHASE1ST_ESTABLISHED) 297 isakmp_info_send_d1(iph1); 298 purge_remote(iph1); 309 struct ph1handle *iph1; local 331 struct ph1handle *iph1; local 345 while ((iph1 = getph1bydstaddrwop(dst)) != NULL) { 346 loc = racoon_strdup(saddrwop2str(iph1->local)); 349 if (iph1->status == PHASE1ST_ESTABLISHED [all...] |
ipsec_doi.c | 172 * the pointer to one of isakmpsa in proposal is set into iph1->approval. 179 ipsecdoi_checkph1proposal(sa, iph1) 181 struct ph1handle *iph1; 192 newsa = get_ph1approval(iph1, pair); 199 iph1->sa_ret = newsa; 209 get_ph1approval(iph1, pair) 210 struct ph1handle *iph1; 219 if (iph1->approval) { 220 delisakmpsa(iph1->approval); 221 iph1->approval = NULL [all...] |
isakmp_var.h | 112 struct ph1handle *iph1));
|
/external/iputils/ |
ping6.c | 1638 struct ip6_hdr *iph1 = (struct ip6_hdr*)(icmph+1); local [all...] |